Proposal: Remediating Known Vulnerabilities in Third Party Packages

In order to improve the security of the ONAP code base, projects are to focus on upgrading the third party packages that are direct dependencies. This change has been implemented in the Frankfurt release. Previous releases required vulnerability analysis in addition to package upgrades. Beginning with the Frankfurt release, the remediation of known vulnerabilities in third party packages will be managed as follows.

  • Changes from Remediating Known Vulnerabilities in Third Party Packages in the Beijing through El Alto releases

    • There is no requirement to provide effective/ineffective analysis until there are tools to support the analysis.

    • There is no requirement to create vulnerability review tables.

  • M2

    • Projects identify the direct dependencies (packages) in each project component.

      • NexusIQ provides a list of all packages used in a component.

      • Maven creates dependency tree that identifies direct dependencies as the "left-most packages".

    • Projects identify the most recent version of the direct dependencies

    • SECCOM updates oparent.pom to include the most recent version of included packages that are available at M2.

    • Each project opens Jiras tickets to update older package versions in direct dependencies.

      • Note: There is no requirement to upgrade transitive dependent packages.

      • There must be a separate Jira for each package to be upgraded in each project repository.

      • Required information in Jira ticket:

        • Old and new version numbers

        • Label of "ComponentUpgrade"

        • Fix Version = release under development

    • Exceptions: The project must request a TSC exception for each direct dependency that cannot be upgraded by M4.

      • Required information in the "ComponentUpgrade" Jira ticket with an exception:

        • The reason that the package cannot be upgraded,

        • Fix Version = the next release to be developed

  • M4

    • Project will close each Jira ticket that has been completed.

    • SECCOM will create a report of the status of all "ComponentUpgrade" Jiras for the release.

    • Open tickets will require a TSC exception

      • Jiras with M4 exceptions must contain the same information documented above

  • Readthedocs

    • All projects will list all CVEs (CVE number only) associated with third party packages in the readthedocs in the Third Party Vulnerabilities section.

      • Vulnerabilities are listed in the NexusIQ reports for each project repository scanned



The CLAMP team will investigate writing a script to automatically generate project-level Jira tickets for all direct dependencies.